Articles

Dependency injection (DI) can be a somewhat difficult concept to grasp and even more confusing to apply to new or existing applications. Jesse Smith shows you how to perform DI without an injection container by using either C# or Java.

Many modern networks contain a daunting number of devices, and it is your job to understand the function of each device and how they work with one another. This chapter from CompTIA Network+ N10-006 Cert Guide covers characteristics of media types, infrastructure components, and specialized network devices.

Introduced by software engineer Robert Martin in the early 2000s, the five basic SOLID principles for good object-oriented programming design discussed in this article make code-bases more clean and maintainable. Jesse Smith shows you how the principles discussed here enable you to create more flexible, robust and reusable code.

There are numerous problems with threads in Python, but Python can work around almost all of these issues with coroutines, which let you have many seemingly simultaneous functions in your Python programs. Brett Slatkin discusses coroutines in this excerpt from Effective Python: 59 Specific Ways to Write Better Python.

Performance (and performance improvement for that matter) in healthcare is not where it needs to be. Instead of critiquing the solutions implemented and working from there, Ian D. Wedgwood looks instead at the improvement methodologies used, in this chapter from Lean Sigma--Rebuilding Capability in Healthcare.

A string is simply a sequence of characters. Like most entities in Ruby, strings are first-class objects. In everyday programming, we need to manipulate strings in many ways. We want to concatenate strings, tokenize them, analyze them, perform searches and substitutions, and more. In this chapter from The Ruby Way: Solutions and Techniques in Ruby Programming, 3rd Edition, Hal Fulton and André Arko show you how Ruby makes most of these tasks easy.

Apple-supplied documentation provides important development support, but many developers don't discover the full extent of help available within Xcode and online. Erica Sadun, bestselling author of dozens of books on programming, dives a little deeper to show you some power tips for finding just the right documentation.

This chapter from CompTIA Security+ SY0-401 Exam Cram, 4th Edition discusses how to use the proper network implementation of protocols and services as a tool to protect and mitigate threats against network infrastructure based on organizational needs. It also has a section specifically dedicated to wireless security implementation based on organization requirements.

When a visitor to your website has iOS apps on her device, a little bit of coding can let you take advantage of that situation, starting her device's native apps for a better user experience. Wei-Meng Lee shows how to take advantage of these iOS capabilities. Her device doesn't have the appropriate app? Your site's programming can detect that sales opportunity, displaying a banner that lets her view your app on the Apple Store and (if desired) automatically and immediately install it.